Segment protection scheme for a network

Inactive Publication Date: 2008-07-08
THE RES FOUND OF STATE UNIV OF NEW YORK
View PDF36 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0027]This invention broadly comprises a novel segment protection scheme (survivability framework) for a network, which we refer to as PROMISE (Protection using MultIple SEgments). It combines the best of existing link and path protection schemes (e.g., bandwidth efficiency and fast recovery). A basic idea behind PROMISE is to divide an active path or AP (along which a survivable connection is established) into several, possibly overlapping active segments or ASs, an

Problems solved by technology

In general, protection schemes can recover more quickly as the detour is already determined (as long as the detour is not broken), but are less bandwidth efficient than restoration schemes.
On the other hand, restoration schemes can survive one or multiple failures (as long as the destination is still reachable, and there is sufficient bandwidth), but they cannot guarantee the recovery time (including the time to find a detour), and/or the amount of information loss for real-time applications, making them unsuitable for mission-critical applications.
These issues are challenging because the objectives to optimize bandwidth usage, algorithm complexity and recovery time often conflict with each other.
However, finding an optimal pair of link (or node) disjoint paths that minimizes the total bandwidth consumption by the request, given that bandwidth sharing is possible, is an NP-hard problem.
In addition, the optimal pair, (if found, by using branch-and-bound techniques), often includes a long BP (consisting of many “zero or super low cost” links on which the bandwidth allocated to existing BPs can be shared), and this results in a long recovery time.
Existing efforts in achieving maximal bandwidth efficiency often resort to integer linear programming (ILP) which is not tractable/feasible for large-scale networks.
Other existing heuristic approaches sacrifice bandwidth efficiency, or trade recovery time for bandwidth efficiency.
The former chooses a set of rings that can cover all the nodes in a mesh network, but the traffic carried on any uncovered links in the mesh network cannot be protected against failure.
Even for a planar graph, it is difficult, if possible at all, to have small protection cycles (so that recovery can take place along shorter detours).
However, detours can also be long, and in addition, the number of p-cycles needed can be large, which requires complicated co-ordination amongst these p-cycles for the purpose of recovery.
More specifically, because it requires that the protection paths for all APs that terminate at a given egress router be determined simultaneously, one cannot take advan

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Segment protection scheme for a network
  • Segment protection scheme for a network
  • Segment protection scheme for a network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034]In the detailed description that follows, the following acronyms are used:

[0035]

PROMISE:PROtection with MultIple SEgmentsAPF-PBC:Active Path First with Potential Backup CostWDM:Wavelength-division multiplex (or multiplexed)MPLSMulti-protocol label switchingMPλS:Multi-protocol Lambda (i.e., wavelength) switchingDCIM:Distributed Complete Information ManagementDPIM:Distributed Partial Information ManagementAS:Active SegmentBS:Backup SegmentAP:Active PathBP:Backup Path

[0036]In a preferred embodiment, we consider a network G with E directed links (represented by set ε) and V nodes, which can be classified into two categories: edge nodes (ingress or egress), to which users or terminal devices are connected, and core nodes (which are nodes other than an edge node).

[0037]To facilitate our presentation, we will use a tuple (s→d, w) to represent a new request for connection establishment (or release), where s and d are the source (or ingress) and destination (or egress) of the connectio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention broadly comprises a novel segment protection scheme (survivability framework) for a network, which we refer to as PROMISE (Protection using MultIple SEgments). It combines the best of existing link and path protection schemes (e.g., bandwidth efficiency and fast recovery). The PROMISE approach divides an active path or AP (along which a survivable connection is established) into several, possibly overlapping active segments or ASs, and then protects each AS with a detour called backup segment or BS (instead of protecting the AP as a whole as in path protection schemes). This facilitates the bandwidth sharing not only among the BSs for different APs, but also among those for the same AP. In addition, recovery time can be shortened due to the limited length of each AS and BS. This technology can be applied to MPLS, ATM, SONET, WDM and other high-speed link layers under the evolving G-MPLS framework.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application claims the benefit under 35 U.S.C. §119(e) of U.S. Provisional Application No. 60 / 380,491, filed May 14, 2002.FIELD OF THE INVENTION[0002]The present invention relates generally to computer and telecommunication networks and, more particularly, to a segment protection scheme for such networks which offers fast recovery, bandwidth efficiency, with path and link protection.BACKGROUND OF THE INVENTION[0003]As our national security, economy and even day-to-day life rely more and more on computer and telecommunication networks, avoiding prolonged disruptions to information exchange due to unexpected failures, such as a broken fiber link, becomes increasingly important. Hence, it is critical for a network to be survivable (or fault-tolerant).[0004]Two known survivability schemes are protection and restoration. The major difference between the two is that in protection, recovery from a failure (e.g., the detour set-up and spare ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F15/173H04J14/02H04L12/56H04Q11/00
CPCH04J14/0245H04L45/02H04L45/22H04L45/24H04L45/28H04Q11/0062H04J14/0249H04J14/0227H04J14/0286H04J14/0287H04J14/029H04J14/0291H04Q2011/0077H04Q2011/0081H04J14/0284
Inventor QIAO, CHUNMINGXU, DAHAIXIONG, YIZHI
Owner THE RES FOUND OF STATE UNIV OF NEW YORK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products